Your search returned 61 results.

1. Books
Fundamentals of computer security technology / Edward G. Amoroso

by Amoroso, Edward G [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: London : Prentice Hall, c1994Availability: Items available for loan: National University - Manila (1). Collection(s): Computer Engineering Call number: GC QA 76.9.A25 .A46 1994.

2. Books - Reference
Defensive security handbook : best practices for securing infrastructure / Lee Brotherston and Amanda Berlin

by Brotherston, Lee [author] | Berlin, Amanda [co-author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Beijing : O'Reilly Media, Inc., 2017Availability: Items available for loan: National University - Manila (1). Collection(s): Mobile and Web Applications Call number: REF QA 76.9.A25 .B47 2017.

3. Books
The network security test lab: a step-by-step guide / Michael Gregg

by Gregg, Michael [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, IN : Wiley, 2015Availability: Items available for loan: National University - Manila (1). Collection(s): Mobile and Web Applications Call number: GC QA 76.9.A25 .G74 2015.

4. Books - Reference
(ISC)2 CISSP Certified Information Systems Security Professional : official study guide / Mike Chapple, James Michael Stewart and Darril Gibson

by Chapple, Mike [author] | Stewart, James Michael [co-author] | Gibson, Darril [co-author].

Edition: Eight edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianapolis, Indiana : John Wiley & Sons, c2018Availability: Items available for loan: National University - Manila (1). Collection(s): Mobile and Web Applications Call number: REF QA 76.3 .C43 2018.

5. Books
The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress

by Andress, Jason [author].

Series: Syngress basics seriesEdition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Elsevier/Syngress, Syngress is a imprint of Elsevier, 2014Availability: Items available for loan: National University - Manila (1). Collection(s): Mobile and Web Applications Call number: GC QA 76.9 .A53 2014.

6. Books - Reference
Information assurance handbook : effective computer security and risk management strategies / Corey Schou and Steven Hernandez

by Schou, Corey [author] | Hernandez, Steven [co-author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill Education, c2014Availability: Items available for loan: National University - Manila (1). Collection(s): Mobile and Web Applications Call number: REF TK 5105.59 .S36 2014.

7. Books
Information security management principles: an ISEB Certificate / Andy Taylor (editor), David Alexander, Amanda Finch and David Sutton

by Alexander, David [author] | Taylor, Andy [editor] | Finch, Amanda [co-author] | Sutton, David [co-author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Swindon, U.K. : British Computer Society, ©2008Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC QA 76.9.A5 .A44 2008.

8. Books
Honds-on peretrationh testing on windows : unleash Kali Linux, PowerShell and windows debugging tools for security testing and analysis / Phil Bramwell

by Bramwell, Phil [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: United Kingdom : Packt Publishing Ltd., 2018Availability: Items available for loan: National University - Manila (1). Collection(s): Computer Science Call number: GC QA 76.9.A25 .B73 2018.

9. Books
Principles of information security / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E [author] | Mattord, Herbert J [co-author].

Edition: Second Edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Princeton, N.J. : Recording for the Blind & Dyslexic, c2005Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC TK 5105.59 .W45 2005.

10. Books
How to do everything to fight spam, viruses, pop-ups & spyware / Ken Feinstein

by Feinstein, Ken [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill Professional, c2004Availability: Items available for loan: National University - Manila (1). Collection(s): CCIT Call number: GC PS 3573 .F45 2004.

11. Books
Computer security / Dieter Gollmann.

by Gollmann, Dieter [author].

Series: Worldwide series in computer scienceMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Chichester ; New York : Wiley, c1999Availability: Items available for loan: National University - Manila (1). Collection(s): CCIT Call number: GC QA 76.9.A25 .G65 1999.

12. Books
Computer forensics jumpstart / Michael G. Solomon, K. Rudolph, Ed Tittle [and others].

by Solomon, Michael G [author] | Rudolph K [co-author] | Tittel, Ed [co-author] | Broom, Neil [co-author] | Barrett, Diane [co-author].

Series: Sybex serious skillsEdition: Second edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Indianopolis, Ind. : Wiley Pub., c2011Availability: Items available for loan: National University - Manila (1). Collection(s): Computer Science Call number: GC QA 76.9.A25 .C65 2011.

13. Books
Readings and cases in information security : law and ethics / Michael E. Whitman and Herbert J. Mattord

by Whitman, Michael E [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boston, MA : Cengage Learning, c2011Availability: Items available for loan: National University - Manila (1). Collection(s): Machine Learning Call number: GC TK 5105.5 .W45 2011.

14. Books
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, and James M. Aquilina

by Malin, Cameron H [author] | Casey, Eoghan [co-author] | Aquilina, James M [co-author] | Rose, Curtis W [technical editor].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Waltham, MA : Syngress, c2012Availability: Items available for loan: National University - Manila (2). Collection(s): Digital Forensic Call number: GC QA 76.76.C68 .M35 2012 c.1.

15. Books
Windows forensic analysis toolkit : advanced analysis techniques for Windows 7 / Harlan Carvey

by Carvey, Harlan A [author].

Edition: Third edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Rockland : Syngress, c2012Availability: Items available for loan: National University - Manila (1). Collection(s): Computer Science Call number: GC HV 8079.C65 .C37 2012.

16. Books
Computer forensics : infosec pro guide / David Cowen

by Cowen, David [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: New York : McGraw-Hill/Osborne, c2013Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC HV 8079.C65 .C69 2013.

17. Books
Computer forensics : investigating network intrusions and cybercrime /

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Cengage ; EC-Council Press, c2010Availability: Items available for loan: National University - Manila (2). Collection(s): Digital Forensic Call number: GC TK 5105.59 .C66 2010 c.1.

18. Books
Digital forensics for handheld devices / Eamon P. Doherty

by Doherty, Eamon P [author].

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Boca Raton : CRC Press, c2013Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC HV 8079.C65 .D64 2013.

19. Books
Computer forensics : investigation procedures and response

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Course Technology Cengage Learning, c2010Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC HV 8079.C65 .C66 2010.

20. Books
Computer forensics : investigating hard disks, file and operating systems

Material type: Text Text; Format: print ; Literary form: Not fiction Publication details: Clifton Park, NY : Course Technology Cengage Learning, c2010Availability: Items available for loan: National University - Manila (1). Collection(s): Digital Forensic Call number: GC HV 8079.C65 .C667 2010.

© 2021 NU LRC. All rights reserved.Privacy Policy I Powered by: KOHA